SEAMAN: A Security-Enabled Anonymous MANET Protocol - PowerPoint PPT Presentation

vlad
seaman a security enabled anonymous manet protocol n.
Skip this Video
Loading SlideShow in 5 Seconds..
SEAMAN: A Security-Enabled Anonymous MANET Protocol PowerPoint Presentation
Download Presentation
SEAMAN: A Security-Enabled Anonymous MANET Protocol

play fullscreen
1 / 21
Download Presentation
101 Views
Download Presentation

SEAMAN: A Security-Enabled Anonymous MANET Protocol

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. SEAMAN: A Security-EnabledAnonymous MANET Protocol Harald H.-J. Bongartz, Tobias Ginzler, Thomas Bachran {bongartz,ginzler,bachran}@fgan.de Pere Tuset tuspeipe@eupmt.upc.edu

  2. Problem Statement (1/2) - Scenarios Communicationwithin group ofvehicles • Tactical military operations • Police and emergency response operations • Multi-robot systems in military and civilian emergency scenarios Communicationof foot soldiers Data exchange in multi-robot system or sensor network Command postnetwork Source: DRDC Valcartier, Canada

  3. Problem Statement (2/2) • Requirements • Data transmission over wireless medium (radio) • No infrastructure available • Fast deployment • Self-configuring • ”Self-healing” • Assumptions • Mobile Ad hoc Network • Platoon size (approx. 50 participants) • Continuous operation during deployment (sufficient power supply)

  4. Security Requirements Our concern: External (non-authenticated) eavesdroppers/attackers! • High confidentiality • Secrecy of message contents • Anonymity of node identities • Message and Network integrity • of payload data • of network management data • Resilience against various attacks • General reconnaissance • Identification of conspicuous nodes • Replay attacks

  5. SEAMAN Concept Security Enabled Anonymous MANET Protocol = Full External Anonymity + Link Layer Encryption and Integrity + Efficient Multicast MANET Routing + Distributed Key Management


  6. Network Topology Operations • Node Join • Node Leave • Forced Node Eject Group Merge Group Split

  7. Group Merge / Node Join

  8. Authentication Sequence • Anonymous Authentication using • Perfect Pseudonyms and • Group-identifiable Pseudonyms • Result: • Temporary Bridge Key • Used until common MANET key established

  9. Group-identifiable Pseudonyms • Node identity hidden • Public keys signed by Certification Authority (CA) • Pseudonym revocation by publication of Sym(A)

  10. Generation of GiPs

  11. Key Management Consolidation

  12. Key Management Consolidation

  13. Key Management Consolidation

  14. Key Management Consolidation

  15. Key Management Consolidation

  16. Key Update Sequence

  17. Key Update Sequence

  18. Key Update Sequence

  19. Key Update Sequence

  20. Other Network Topology Operations • Group Split / Node Leave • Through automatic Key Update • Forced Node Eject • Goal: exclude compromised nodes • Revoke GiP Symmetric Key • Update MANET Key

  21. Conclusion and Future Work • Conclusion • SEAMAN Framework for mobile ad hoc network security • Against external attackers in mission-critical MANETs • Secrecy, Integrity, Anonymity • Future Work • Implementation • WNet for MANET Routing • MIKE for Key Management • MASK for Anonymous Authentication • Tests in simulation and testbed • Integration of Intrusion Detection System